Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 02:55

General

  • Target

    85179dcefb0ad2d2d5049c53d093e700N.exe

  • Size

    78KB

  • MD5

    85179dcefb0ad2d2d5049c53d093e700

  • SHA1

    fa2570fd80b7366207c2eaa307a8b930e1b8e866

  • SHA256

    4c16d4255077e312e81bdaff984b65fab478179e7c302be88e01a40648026d9d

  • SHA512

    1b9e56e6cfe66b20eeba4e8672f7d947c6e10be3f78502bc7fcbc620055ce7ea92f09d0d2ae291819999217c7bc3d0261c5a27b1554566028011301327331646

  • SSDEEP

    1536:NHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtk9/op1RA:NHFonhASyRxvhTzXPvCbW2Uk9/oW

Malware Config

Signatures

  • MetamorpherRAT

    Metamorpherrat is a hacking tool that has been around for a while since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85179dcefb0ad2d2d5049c53d093e700N.exe
    "C:\Users\Admin\AppData\Local\Temp\85179dcefb0ad2d2d5049c53d093e700N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uos9cmna.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7A9E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4BCFF4F6F9204328989DB9C9C92A7D5E.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2080
    • C:\Users\Admin\AppData\Local\Temp\tmp78F9.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp78F9.tmp.exe" C:\Users\Admin\AppData\Local\Temp\85179dcefb0ad2d2d5049c53d093e700N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:316

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES7A9E.tmp
    Filesize

    1KB

    MD5

    27736979b520c0e922a500b42efd7dc7

    SHA1

    26a8209e0f8b6f12ba50b567a1e92ed0528cf8b0

    SHA256

    457942026fbdd48df4326f854cfc0f275be4e1e4c82d2ad737c070b2a9ca4de6

    SHA512

    23a5f9c3431cd67409b76114150552a11ec5d5270ff538f386b362df862543904485463d80e3d421e84126ef1d9a9568c851a7c88c12bfb29a2815c5db560eb0

  • C:\Users\Admin\AppData\Local\Temp\tmp78F9.tmp.exe
    Filesize

    78KB

    MD5

    ed040e015b25fa32500d23132508f57a

    SHA1

    34f53ee34afa4a54316eac41e4067173e78c7725

    SHA256

    9f51890753d3c7adf1ae1e45f8d9eda55f443e4dd3a55b6ff7417b6e2521de60

    SHA512

    efce091a88b46cfe9896fc56de718e23357a115600dc360c979f9e46ef90fd718205edb0a8b427ab44b827875e021f9501d32c24e8b444bfe5bc2fe10056298d

  • C:\Users\Admin\AppData\Local\Temp\uos9cmna.0.vb
    Filesize

    15KB

    MD5

    90ef1f981900febf5098f12a9ab87c65

    SHA1

    d231b6438d7dcabc0991a23d4524df9bd89f763d

    SHA256

    110658879e84bf3e788e2d88c3fe9d8cd9fa74b5b06c55e3ad730c244ce4bc52

    SHA512

    7b3a193e054475d1893d5614455decc9eb2df7ced1ab9aed8f5a66b9262a203fc3c744d3372bf7306db0ac57a7951b848eb9b38acd64d1a9dc2bab0624ad6006

  • C:\Users\Admin\AppData\Local\Temp\uos9cmna.cmdline
    Filesize

    266B

    MD5

    3d398857aadb0a9725e279eb0ce94a64

    SHA1

    5729a8fd8025272c0b5b978a3620cc50cb33de7d

    SHA256

    28c2a101089fb319c0212f3bf3431d55d7b84f2f83eadd5898e330551d359c05

    SHA512

    6af9a289f51645ce9c52651e421790031ae292218257388c69471a6cbdcefebc37b9e834531f45066388bb2c0a3d12d7b88a8de80ea366240dcf373e77a6d8fe

  • C:\Users\Admin\AppData\Local\Temp\vbc4BCFF4F6F9204328989DB9C9C92A7D5E.TMP
    Filesize

    660B

    MD5

    628e0dec4f1672d006228ce215577a39

    SHA1

    d38c23bc36d7af23228d93347e5cb8bd522aa77f

    SHA256

    f293a6579094bfa8c596db31d40a9d70f29f345ebb388e8311ca2901ef77efc5

    SHA512

    93511bce3d8fa6d62420ad17eb26202beed60a01233dc32e41c0d13fd358a107e541564c74cd1edbc0cb9a793529171ca37878c3fef885018c523f9f5db0d465

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources
    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/316-23-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/316-24-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/316-26-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/316-27-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/316-28-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/3932-2-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/3932-1-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/3932-22-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/3932-0-0x0000000075432000-0x0000000075433000-memory.dmp
    Filesize

    4KB

  • memory/4608-8-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB

  • memory/4608-18-0x0000000075430000-0x00000000759E1000-memory.dmp
    Filesize

    5.7MB